Advanced persistent security: a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risk...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Cambridge, MA
Syngress
[2017]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780128093658/?ar |
Zusammenfassung: | Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face. |
Beschreibung: | Includes index. - Online resource; title from PDF title page (EBSCO, viewed December 1, 2016) |
Umfang: | 1 Online-Ressource |
ISBN: | 9780128093658 012809365X |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047408561 | ||
003 | DE-627-1 | ||
005 | 20240228120201.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2017 xx |||||o 00| ||eng c | ||
020 | |a 9780128093658 |c electronic bk. |9 978-0-12-809365-8 | ||
020 | |a 012809365X |c electronic bk. |9 0-12-809365-X | ||
035 | |a (DE-627-1)047408561 | ||
035 | |a (DE-599)KEP047408561 | ||
035 | |a (ORHE)9780128093658 | ||
035 | |a (DE-627-1)047408561 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Winkler, Ira |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Advanced persistent security |b a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies |c Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor |
264 | 1 | |a Cambridge, MA |b Syngress |c [2017] | |
264 | 4 | |c ©2017 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Online resource; title from PDF title page (EBSCO, viewed December 1, 2016) | ||
520 | |a Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer security | |
650 | 0 | |a Hacking | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Piratage informatique | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hacking | |
700 | 1 | |a Gomes, Araceli Treu |e VerfasserIn |4 aut | |
700 | 1 | |a Shackleford, Dave |e HerausgeberIn |4 edt | |
776 | 1 | |z 0128093161 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0128093161 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780128093658/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047408561 |
---|---|
_version_ | 1821494909374300160 |
adam_text | |
any_adam_object | |
author | Winkler, Ira Gomes, Araceli Treu |
author2 | Shackleford, Dave |
author2_role | edt |
author2_variant | d s ds |
author_facet | Winkler, Ira Gomes, Araceli Treu Shackleford, Dave |
author_role | aut aut |
author_sort | Winkler, Ira |
author_variant | i w iw a t g at atg |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047408561 (DE-599)KEP047408561 (ORHE)9780128093658 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02673cam a22005532 4500</leader><controlfield tag="001">ZDB-30-ORH-047408561</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120201.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128093658</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-809365-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">012809365X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-809365-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047408561</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047408561</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780128093658</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047408561</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Winkler, Ira</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advanced persistent security</subfield><subfield code="b">a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies</subfield><subfield code="c">Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Online resource; title from PDF title page (EBSCO, viewed December 1, 2016)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piratage informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gomes, Araceli Treu</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shackleford, Dave</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0128093161</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0128093161</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780128093658/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047408561 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:21:52Z |
institution | BVB |
isbn | 9780128093658 012809365X |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Syngress |
record_format | marc |
spelling | Winkler, Ira VerfasserIn aut Advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor Cambridge, MA Syngress [2017] ©2017 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Online resource; title from PDF title page (EBSCO, viewed December 1, 2016) Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face. Computer networks Security measures Computer security Hacking Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Piratage informatique COMPUTERS ; Security ; General Computer networks ; Security measures Gomes, Araceli Treu VerfasserIn aut Shackleford, Dave HerausgeberIn edt 0128093161 Erscheint auch als Druck-Ausgabe 0128093161 |
spellingShingle | Winkler, Ira Gomes, Araceli Treu Advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies Computer networks Security measures Computer security Hacking Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Piratage informatique COMPUTERS ; Security ; General Computer networks ; Security measures |
title | Advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies |
title_auth | Advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies |
title_exact_search | Advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies |
title_full | Advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor |
title_fullStr | Advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor |
title_full_unstemmed | Advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor |
title_short | Advanced persistent security |
title_sort | advanced persistent security a cyberwarfare approach to implementing adaptive enterprise protection detection and reaction strategies |
title_sub | a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies |
topic | Computer networks Security measures Computer security Hacking Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Piratage informatique COMPUTERS ; Security ; General Computer networks ; Security measures |
topic_facet | Computer networks Security measures Computer security Hacking Computer Security Réseaux d'ordinateurs ; Sécurité ; Mesures Sécurité informatique Piratage informatique COMPUTERS ; Security ; General Computer networks ; Security measures |
work_keys_str_mv | AT winklerira advancedpersistentsecurityacyberwarfareapproachtoimplementingadaptiveenterpriseprotectiondetectionandreactionstrategies AT gomesaracelitreu advancedpersistentsecurityacyberwarfareapproachtoimplementingadaptiveenterpriseprotectiondetectionandreactionstrategies AT shackleforddave advancedpersistentsecurityacyberwarfareapproachtoimplementingadaptiveenterpriseprotectiondetectionandreactionstrategies |